A week in security (August 12 – 18)

Credit to Author: Malwarebytes Labs| Date: Mon, 19 Aug 2019 17:55:50 +0000

A roundup of the most interesting cybersecurity news stories from August 12 to 18, including a deep dive into facial recognition technology, swatting dangers, social engineering attacks on cities, and more.

Categories:

Tags:

(Read more…)

The post A week in security (August 12 – 18) appeared first on Malwarebytes Labs.

Read more

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Data and device security for domestic abuse survivors

Credit to Author: David Ruiz| Date: Tue, 13 Aug 2019 16:33:22 +0000

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Read more

Android based IoT devices with open ADB port inviting easy attacks by Crypto-miners

Credit to Author: Sushmita Kalashikar| Date: Wed, 07 Aug 2019 11:10:07 +0000

The rapid pace at which connected smart home devices are increasing, have opened the gates for a new era of cyber-attacks on IoT devices including smart phones, TVs, IP cameras, etc. These attacks are mostly in the form of crypto mining attacks wherein cryptocurrency-mining botnet enters the targeted device via…

Read more

Mobile Menace Monday: Dark Android Q rises

Credit to Author: Gleb Malygin| Date: Mon, 29 Jul 2019 17:55:12 +0000

The Android Q operating system is being developed with privacy and security in mind. We take a look at both, examining new features intended for giving users better control of their devices and data.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Dark Android Q rises appeared first on Malwarebytes Labs.

Read more

Trinity Miner using open ADB port to target IoT devices

Credit to Author: Vallabh Chole| Date: Fri, 26 Jul 2019 10:08:11 +0000

In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day gadgets are becoming smarter. All these IoT devices are powered by ARM-based processor and run on android and unix operating system. These IoT devices include mobiles, smart T.V., routers, IP cameras and…

Read more

5 smart questions that'll smother most Android security scares

Credit to Author: JR Raphael| Date: Thu, 25 Jul 2019 03:00:00 -0700

I haven’t looked at today’s tech news too closely just yet, but I have a sneaking suspicion some evil-sounding virtual gremlin or other is probably on the brink of invading my smartphone, stealing my secrets, and setting me up for a lifetime of dread and despair.

He might even be covertly eating all the salty snacks from my kitchen this very second. ALL THE SALTY SNACKS, DAMN IT!

I don’t have to scan the headlines too closely to know there’s a decent chance of all of this happening — because all of this happens practically every other week here in the Android world. A solid few to several times a month, it seems, some hilariously named and made-to-seem-scary new piece of malware (ViperRat! Desert Scorpion! Ooga-Booga-Meanie-Monster!) is making its way onto our phones and into our lives. Or so we’re told, rather convincingly and repeatedly. (All right, so I may have made Ooga-Booga-Meanie-Monster up just now, but c’mon: It’s probably only a matter of time til we see something using that name.)

To read this article in full, please click here

Read more

Your Android’s accelerometer could be used to eavesdrop on your calls

Credit to Author: Danny Bradbury| Date: Tue, 23 Jul 2019 10:13:08 +0000

Researchers have created an attack called Spearphone that uses the motion sensors in Android phones to listen to phone calls, interactions with your voice assistant, and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/XizfSFAizIQ” height=”1″ width=”1″ alt=””/>

Read more

Parental monitoring apps: How do they differ from stalkerware?

Credit to Author: David Ruiz| Date: Mon, 22 Jul 2019 15:00:00 +0000

What are the differences between stalkerware apps and parental monitoring apps? What is an “acceptable” or “safe” parental monitoring app? And how can a parent know whether they’re downloading a “legitimate” parental monitoring app or instead a stalkerware app merely disguised as a tool for parents?

Categories:

Tags:

(Read more…)

The post Parental monitoring apps: How do they differ from stalkerware? appeared first on Malwarebytes Labs.

Read more

Aplicaciones maliciosas de Android ignoran tus permisos

Credit to Author: Naked Security| Date: Thu, 11 Jul 2019 11:46:43 +0000

¿Conoce esos cuadros de diálogo de Android que aparecen cuando se ejecuta una aplicación por primera vez y pregunta qué permisos desea otorgar al software? No son tan útiles como todos pensamos. Un nuevo estudio ha revelado que las aplicaciones están espiando datos, incluyendo la ubicación y el número de identificación único del teléfono, incluso [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/xKW84fYzy5Q” height=”1″ width=”1″ alt=””/>

Read more